Computing
Word Processing and Spreadsheets
Cyber Security
Terms
100

What is a computer?

What is an electronic device that can perform various tasks and calculations?

100

List two major word processing applications.

Microsoft Word, Google Docs, Apple Pages

100

What is cybersecurity?

What is the term for the practice of protecting systems, networks, and data from digital attacks?

100

What does AUP stand for?

Acceptable Use Policy

200

Name two main components of a computer.

What are the central processing unit (CPU) and the memory (RAM)?

200

What are two common uses of electronic spreadsheets?

  • Creating and maintaining check lists.
  • Simple calculations.
  • Data Visualization.
  • Storing and sharing data.
200

What are examples of information that may be at risk?

Personal data, financial information, login credentials.

200

What does HTML mean

Hypertext Markup Language

300

Define cloud computing. 

Cloud computing is the delivery of computing services over the internet, including storage, processing power, and applications.

300

 Name two major electronic spreadsheet applications.

Microsoft Excel, Google Sheets, Apple Numbers.

300

What are various methods for protecting personal information?

Using strong and unique passwords, enabling two-factor authentication, and avoiding sharing personal information online.

300

 What is a speech or talk in which a new product, idea, or work is shown and explained to an audience.

A presentation

400

What are the differences between hardware, firmware, and software?

ardware refers to the physical components, and software is a set of instructions that a computer can execute.

400

What is the Keyboard shortcut for pasting.

CTRL+V
command+V

400

 What are three methods of protecting personal information?

Install and regularly update antivirus software, keep software up to date, and be cautious of suspicious emails and links.

400

What is Copyright

 Copyright gives the right to copy only to the owner

500

Name the three key productivity tools. 

Word processing, spreadsheet, and presentation software.

500

What are some appropriate formatting features to show emphasis on text. 

Applying bold, italics, and underline

500

List four(4) types of malware.

Ransomeware, trojan, virus, worm, phishing, adware. 

500

What is OSHA

Occupational Safety and Health Administration